Classified documents have become the latest tool in a government contractor's surveillance arsenal, according to an FBI affidavit. Aurelio Luis Perez-Lugones, an IT specialist for an unnamed government contractor, was charged with unlawful retention of national defense information after investigators searched his home and seized several personal devices.
The investigation began when federal agents discovered that Perez-Lugones had been communicating with Washington Post journalist Hannah Natanson about classified information. The affidavit alleges that Perez-Lugones printed a confidential report, but instead of printing the actual document, he took screenshots and pasted them into a Microsoft Word document.
In an effort to avoid detection, Perez-Lugones's employer likely relied on printer monitoring software to view the contents of the printed documents. The FBI affidavit reveals that certain commercial systems allow workplace administrators to browse the contents of all documents printed or scanned through their software system.
The surprising surveillance tool used by Perez-Lugones highlights the ease with which a government contractor can use an office printer as a means of transmitting sensitive information without being detected. This case underscores the importance of robust data protection measures and cybersecurity protocols in preventing such incidents from occurring.
For those concerned about their own digital security, it is essential to take steps to protect yourself from similar situations. Here are some tips:
- Be mindful of what you print, as most workplace printers log certain information, including file names and users who printed them.
- Consider using encryption or other secure methods to transmit sensitive documents instead of printing them.
- Regularly review your printer settings and monitoring software to ensure that any suspicious activity is detected promptly.
By taking these precautions, individuals can minimize their risk of being inadvertently involved in a government contractor's surveillance activities.
The investigation began when federal agents discovered that Perez-Lugones had been communicating with Washington Post journalist Hannah Natanson about classified information. The affidavit alleges that Perez-Lugones printed a confidential report, but instead of printing the actual document, he took screenshots and pasted them into a Microsoft Word document.
In an effort to avoid detection, Perez-Lugones's employer likely relied on printer monitoring software to view the contents of the printed documents. The FBI affidavit reveals that certain commercial systems allow workplace administrators to browse the contents of all documents printed or scanned through their software system.
The surprising surveillance tool used by Perez-Lugones highlights the ease with which a government contractor can use an office printer as a means of transmitting sensitive information without being detected. This case underscores the importance of robust data protection measures and cybersecurity protocols in preventing such incidents from occurring.
For those concerned about their own digital security, it is essential to take steps to protect yourself from similar situations. Here are some tips:
- Be mindful of what you print, as most workplace printers log certain information, including file names and users who printed them.
- Consider using encryption or other secure methods to transmit sensitive documents instead of printing them.
- Regularly review your printer settings and monitoring software to ensure that any suspicious activity is detected promptly.
By taking these precautions, individuals can minimize their risk of being inadvertently involved in a government contractor's surveillance activities.